Securely connecting users and applications from anywhere to anywhere in today’s global economy. Mobile Now™ for BYOD All your business applications. None.

Slides:



Advertisements
Similar presentations
1/4/2014 Enterprise to Cloud Mobilize, Secure & Accelerate your Business Customer Date `
Advertisements

| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
Securely connecting users and applications from anywhere to anywhere in todays global economy MY-ARRAY DesktopDirect Bring.
 What Is Desktop Virtualization?  How Does Application Virtualization Help?  How does V3 Systems help?  Getting Started AGENDA.
CONFIDENTIAL © Copyright Aruba Networks, Inc. All rights reserved Adaptive Trust Security Policies for Today’s Enterprise Mobility Pete Ryan – ClearPass.
Unified Logs and Reporting for Hybrid Centralized Management
Citrix Partner Update The Citrix Delivery Centre.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
1 SharePoint Momentum 17K+ Customers, 100M Licenses Leader in Gartner ® Magic Quadrants, Forrester Wave TM Continued Platform and Application Innovation.
Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers Vendors.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
IOS 8 for MDM/EMM Greg Elliott Shiv Chandra Kumar.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
Page Copyright Giritech A/S an – Excitor company.
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
Barracuda Networks Steve Scheidegger Commercial Account Manager
General Presentation August Based out of the Netherlands 8 years of development Launched in May Sales offices in Los Angeles, Amsterdam, Hong.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Your storage on the ground; Your files in the cloud.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Motorola Mobility Services Platform
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
1 FirePass 6.0 Sales Training. 2 Agenda FirePass 6.0 Release Highlights Packaging & Pricing Product Availability Q&A.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
© 2013 Avaya Inc. All rights reserved Avaya UC Collaboration Solution A complete solution for midsize companies Mobility Video SecurityNetworking.
Deploying XenApp and XenDesktop with BIG-IP Brent Imhoff – Field Systems Engineer Gary Zaleski – Solutions Architect Michael Koyfman – Solutions Architect.
Citrix Solutions in Financial Services Joseph Alexander Delgado Business Development Manager, Citrix Wordtext Systems, Inc.
Name Company A Day in the Life… A Demonstration of Application Delivery.
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
Alessandro Cardoso Microsoft MVP | Readify National Manager |
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
DaaS (Desktop as a Service) Last Update: July 15 th, 2015.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 1 Bomgar Remote Support.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Microsoft Azure RemoteApp Michael Hacker Cloud Solutions Architect
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Microsoft Virtual Academy Preparing for the Windows 8.1 MCSA Module 5: Managing Devices & Resource Access.
User and Device Management
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
SME in the Cloud Awingu Edition Partner presentation Rolan Linsen Combined Solutions Design | Solutions IT
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
JUNOS PULSE Junos PULSE for Windows Junos PULSE Mobile Security Suite.
KeepItSafe Solution Suite Securely control and manage all of your data backups with ease, from a single location. KeepItSafe Online Backup KeepItSafe.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Total Enterprise Mobility Comprehensive Management and Security
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
Barracuda SSL VPN 2012.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda NextGen Firewalls
Hybrid Cloud Web Filtering Platform
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
2016 Citrix presentation.
Forefront Security ISA
Check Point Connectra NGX R60
MICROSOFT AZURE ISV PROFILE: ONEBE
System Center Marketing
Presentation transcript:

Securely connecting users and applications from anywhere to anywhere in today’s global economy. Mobile Now™ for BYOD All your business applications. None of the business risk. AG series secure access gateways Jump in. The mobile waters are fine.

Sections JUMP IN. THE MOBILE WATERS ARE FINE. 1.What is a secure access gateway? 2.Array secure access solutions  SSL VPN  Remote desktop  Mobility  Business continuity 3.Array AG Series secure access gateways  Product line  Feature matrix 4.Key takeaways 5.Case studies and global satisfied customers

What is a secure access gateway? IPsec VPN Network-level encrypted access Remote access Managed laptops Intranet only Requires client Anytime, anywhere secure access with greater security and control VPN remote access for select workers on managed PCs SSL VPN L7, L4 & L3 encrypted access Any device Intranet or extranet Clientless Granular control Remote access as an enterprise-wide strategy for worker productivity Scalability Enterprise-wide remote access Support employees, partners and guests Thousands of users and burst capacity for BCP events Adapting secure access to address new apps,devices and consumerization Mobility Smart phones, tablets and BYOD Data, device and app management Preventing data leakage when using personal devices ANYTIME-ANYWHERE ANY DEVICE ANY APPLICATION

Internal / Campus Network Up to 256 virtual gateways 2048-bit SSL encryption L3, L4 and L7 connectivity Advanced AAA integration Dual-factor authentication Single sign-on What is a secure access gateway? Per-user policy engine Auditing and reporting End-point security RDP over SSL Wake-on-LAN BCP contingency licenses SECURE ACCESS ARCHITECTURE iOS and Android support Per application L3 mobile VPN L4 SDK for secure tunneling Secure Web browser Enterprise app store Client, app and device security Road Warriors Remote Users Native & Web Apps Enterprise Applications Physical & Virtual Desktops LAN Users Laptops & Desktops WiFi Users BYOD Home Workers Day Extenders Business Continuity Users Smart Phone & Tablet Users

Array secure access solutions AccessDirect ™ SSL VPN Traditional Web or network-level VPN for remote workers. DesktopDirect ™ Remote Desktop Securely access office desktops and apps from any device or location. MotionPro ™ Secure Mobility Securely connect devices and apps to enable business mobility and BYOD. Business Continuity Contingency Licenses Seamless, cost-effective burst remote access for planned and unplanned events.

AccessDirect SSL VPN remote access  Pure SSL “anytime-anywhere” browser-based access  Up to 256 virtual instances support multiple communities of interest  Business units, partners, guests, contractors  Scalable up to 128,000 concurrent users  Enables secure access “enterprise-wide”  Range of access methods  Layer-3 client for trusted workers  Specific resources for unmanaged devices  Web portals for extranet partners Applications Users

SSL VPN security architecture End Point Security Host Checking Adaptive Policies Secure Desktop Cache Cleaning Eliminates all elements of browser cache Local sandbox prevents data leakage SSLSSL AAA Supports all industry standards (AD, RADIUS, LDAP, SecureID) RSA certified Unique SSL integration Fine grain ACLs L3, L4 and L7 External mapping Black list and white list Full audit trail Who, what and when Syslog support Configurable alerts FWFW ProxyProxy File Shares Clientless access to shared directories CIFS/NFS Web Apps Clientless Web application support Networks Full L3 VPN Any IP protocol L4 redirection Denial of Service (DoS) attack protection ACLs (Layer 4) URL filtering (Layer 7) Network probe logging All standard cipher-suites Hardware-accelerated 2048-bit key lengths Client-side certificates Complete separation between non-secured and secured networks

Multiple communities of interest Internet Only Network Access Application AccessQuarantine Engineering Finance PartnersGuests  Portals are customizable to the look and feel and resource needs of each community of interest  Each portal is fully partioned and independently manageable Etc. Portal 1 Portal 2 Network Access Portal 3 Portal 4Portal 5

 Large healthcare insurance provider  $40B in yearly revenue  Over 12M members  Why the need for SSL VPN?  Stove pipe secure access for various use cases was costly to manage and too prone to inconsistencies and data leakage  IPsec was more expensive and less secure vs. SSL VPN  AG Series solution and benefits  Consolidated secure access for local and remote employees, partners and guests on a unified platform  Demonstrable accountability for HIPAA compliance, increased productivity for employees, partners and guests, and decreased cost and complexity Humana – SSL VPN remote access

DesktopDirect remote desktop access  Thin-client RDP access over SSL  Data never leaves the network and never resides on end-user devices  Applications on office desktops usable from remote or mobile devices  Securely enables “bring your own…PC, laptop, tablet or smart phone”  Cost-effectively leverages existing investments in infrastructure, applications and devices to rapidly scale productivity and enterprise mobility

Remote desktop access architecture  Ideal for boosting office worker productivity, ensuring business continuity and enabling secure mobility for business tablets smart phones Securely connect to office desktops from any device, anywhere. Windows VMview physical desktops virtual desktops and terminal services pcs laptops

Productivity and business continuity OutbreaksNatural Disasters Repairs & Deliveries Sick ChildNights & Weekends Home Working Prevent Revenue LossMaintain ProductivityGrow Productivity  Provides a means for office workers (those without managed laptops and VPN access) to remain productive under any circumstance

 Customer-owned community bank  5 locations  Over $1B in assets  48x increase in mobile devices since 2007  Needed to quickly and cost-effectively provide access to bank applications from tablets and laptops without risking data leakage  Selected DesktopDirect solution for BYOD, remote and mobile access  DesktopDirect impact on remote and mobile productivity  11x unique users  120x total hours spent  10x time per user  No security issues, no additional IT staff required Needham Bank – remote and mobile access

MotionPro secure mobile access  Enterprise application portal  Secure access to enterprise resources  Secure browser for Web resources  VPN on-demand for native apps  SDK for secure native app tunnels  Enterprise app store  Secure mobile access  Client security  App management  Device management  Part of an overall mobility strategy  Complements MDM

Secure application access Secure Browser L7 Web apps launched in secure browser Only authorized applications may use the VPN tunnel Secure SDK for Native Apps Native apps developed with SDK will start L4 VPN tunnel VPN on Demand for Native Apps Configured native apps will start L3 VPN automatically

Client security TriggerPre-login, post-login, timer Condition HardwareManufacturer, model, passcode OSType, version, jail-broken, rooted AppBlack and white list, signed Action Lock screen, terminate session, delete MotionPro Alert user, prompt user, log message

Application and device management Access ControlOnly managed apps may use VPN tunnel Application Management PortalAll apps on enterprise app store InstallWhitelist apps installed automatically UninstallManaged apps Device Management Restore settings and passwords Performed manually by administrator

MotionPro vs. MDM  MotionPro and 3 rd party mobile device management (MDM) solutions are complementary Both are needed to enable an enterprise mobility strategy MotionPro provides scalable mobile VPN with basic device and application management MDM provides advanced device and application management but they are not a VPN gateway

COPCP – HIPAA compliant mobility  Ohio’s largest physician-owned cooperative  Over 50 physician offices and over 200 physicians  Healthcare mobility requirements  BYOD strategy that provides physicians with flexibility while also addressing IT requirements for security, manageability and cost  Benefits for physicians and IT  Renew prescriptions anytime, anywhere and move seamlessly between exam rooms using iPads  Reduces cost and complexity while improving productivity and compliance

 Institutional research and brokerage firm  Founded in 1982, based in New York  Why the need for BYOD?  Employees bringing personal iPads to the office and wanted access to corporate applications  Field employees wanted to use iPads instead of laptops  Array AG impact on BYOD enablement  No user learning curve, no new passwords  $30K HW install vs. $300K SW upgrade  3 week installation vs. 8 month project  One HA pair and one DR unit, that’s it! Buckingham Research – BYOD

Business continuity contingency licenses  Array Business Continuity (ABC)  Scalable and affordable burst capacity to meet the demands of planned and unplanned surge remote and mobile access  Affordable and flexible contingency license certificates  Available in 10-day denominations and tiered sizes  Triggered by exceeding standard user licenses and may be utilized in consecutive or non-consecutive 24-hour increments  Any mix of mobile and remote users  AccessDirect, DesktopDirect or MotionPro

Morgan Stanley – Business continuity  World’s 7 th largest bank  $31B in revenue  53,000 employees  DesktopDirect solution  25+ appliances in 8 countries with 5 major data centers  10,000 standard DesktopDirect user’s licenses  Peak capacity of 36,000 users via Business Continuity licenses  January 2011  Massive snowstorm paralyzed the east coast  12,000 users still were able to work using DesktopDirect  Prevented the loss of over $10M in productivity

AG Series product line PHYSICAL & VIRTUAL APPLIANCES SCALING UP & OUT FOR 10,000 Concurrent Users VMware, XenServer, OpenXen AG Concurrent Users AG Concurrent Users AG ,000 Concurrent Users AG ,000 Concurrent Users AG ,000 Concurrent Users AG ,000 Concurrent Users AG1000T 600 Concurrent Users

AG Series feature matrix ● = Standard AccessDirectDesktopDirectMotionPro O = Optional SSL VPN Remote Access Remote Desktop Access Secure Mobile Access Clustering●●● WebUI●●● SSL & IPsec Encryption●●● Virtual Portals5 Included Web Applications● L3 VPN Client● Host Checking & Cache Cleaning● L4 Thin Client● Array Registration Technology● Wake-on-LAN● Enterprise App Store● L3 Mobile VPN● L4 SDK Tunneling● Secure Browser● Client, App & Device Security● Additional Virtual PortalsOOO Array Business ContinuityOOO Multi-Language WebUI●●●

Superior security, scalability and flexibility Up to 128,000 Concurrent Users Up to 3 Gbps Throughput Up to 256 Virtual Gateways AG Series Secure Access Gateways  Unmatched scalability  Consolidate remote and mobile access for an entire workforce  Absorb surge remote and mobile users  More secure  Minimize attack vectors  Simplify management to ensure consistent policies  Highly flexible  Integrated remote access, remote desktop and secure mobile access  Support multiple communities of interest including employees, partners and guests

Superior value of ownership and ROI 20% - 50% Less Expensive Array Competition Superior Service & Support

$ Array AG vs. the competition SMALLMEDIUMLARGE AG1500 Up to 72,000 concurrent users Juniper MAG6611 Up to 40,000 concurrent users Array = 31% less expensive Array = 32K more users Array supports almost twice as many users as Juniper and is almost one third less expensive. Juniper MAG4610 Array = 18% less expensive for 1000 users Array AG1100 Up to 3000 concurrent users Juniper MAG6610 Array = 25% less expensive for 2000 users Array AG1200 Up to 25,000 concurrent users Juniper MAG6610 Array = 27% less expensive for 11,000 users Juniper MAG6611 Array = 35% less expensive for 22,000 users

Key takeaways  Scalable, intuitive secure access for supporting remote and mobile users  Increase productivity  Mitigate business disruptions  Enable enterprise mobility and BYOD  Consolidated SSL VPN, remote desktop access and secure mobile access  Minimizes attack vectors  Simplifies management  Ensures consistent policies  Streamlines the end-user experience  Cost-effective solution for mobilizing any size workforce while preventing attacks and data leakage JUMP IN. THE MOBILE WATERS ARE FINE.

Global satisfied customers

Securely connecting users and applications from anywhere to anywhere in today’s global economy. Mobile Now™ for BYOD All your business applications. None of the business risk. AG series secure access gateways Jump in. The mobile waters are fine.